Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » FedRAMP » Joint Authorization Board

Joint Authorization Board

A Joint Authorization Board or JAB provides FedRAMP (Federal Risk and Authorization Management Program) authorization to cloud service providers. 

The Board consists of the Chief Information Officers (CIOs) from the DHS (Department of Homeland Security, DoD (Department of Defense), and GSA (General Services Administration). 

The JAB reviews authorization packages based on the priority queue for cloud businesses. It is also responsible for assessing the requirements under the FedRAMP security authorization and updating it if necessary. 

Once a business has been selected to be sponsored by JAB, it will be required to create a Readiness Assessment Report (RAR) within a period of 60 days. An RAR contains specific information regarding the capability of the business toward meeting FedRAMP guidelines and requirements.

The JAB designates a “FedRAMP Ready,” stamp after which shows the CSP has been assessed by a Third Party Assessment Organization (3PAO)  and is acceptable as per FedRAMP requirements. After this, a CSP is listed in the FedRAMP marketplace.

After FedRAMP authorization, the JAB continues to monitor the cloud products and services of these business entities, ensuring the continuation of their level of compliance with standards on security and their ability to address issues that arise.

If the JAB grants provisional approval for any cloud service, agencies are empowered to provide their own security authorizations and ATOs. The board must also notify agencies promptly of any changes or removals of provisional approvals.

Additional reading

What is Cybersecurity and Why is It Important?

In the age of the internet, organizations are heavily relying on IT infrastructure to keep them safe from cyberattacks. As more and more organizations are adopting digital transformation, the risk of cybercrime is increasing at a rapid rate; so is the importance of cybersecurity. Cybersecurity has become the knight in shining armour. Strong cybersecurity policy…
cmmc certification cost

CMMC Certification Cost: Breaking Down the Cost Components

The Cybersecurity Maturity Model Certification (CMMC), developed by the U.S. Department of Defense details the cybersecurity requirements for contractors in the Defense Industrial Base. It is published by the National Institute of Standards and Technology (NIST). If you are a defense contractor, you must protect controlled unclassified information (CUI) from a wide range of threats…

Standard Contractual Clauses: A Guide for International Data Transfers

Data is sensitive, and ensuring the integrity and security of the personal data of the citizens of the European Union (EU) is one of the key objectives of the General Data Protection Regulation(GDPR). The GDPR law aims to protect the interests of data within and outside the boundaries of the EU. How does it do…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.